SlideShare a Scribd company logo
1 of 2
BCT Section 2.01 Terms
                                Technology Issues
1. Tech & Education               1.   Education
                                  2.   Internet
                                  3.   Distance Learning
                                  4.   Computer-Based Learning
                                  5.   Simulations

2. Tech & Science                 1. Artificial Intelligence
                                  2. Genetic Engineering
                                  3. Virtual Reality

3. Tech & Work                    1. Multinational Economy
                                  2. Electronic Commerce

4. Technology Careers             1.   Business & Office
                                  2.   Administrative Assistant
                                  3.   Desktop Publisher/Graphic Designer
                                  4.   Network Support and Administration
                                  5.   PC Support Specialist
                                  6.   Manager of Information Systems
                                  7.   Database Administrator
                                  8.   Software Engineer
                                  9.   Web Master

5. Administrative Assistant       a person employed to aid an executive, as in a
                                  corporate department, by coordinating such
                                  office  services   and   procedures    as   the
                                  supervision, maintenance, and control of the
                                  flow   of  work   and   programs, personnel,
                                  budgeting,   records,  etc.,  for  the    entire
                                  department
6. Graphic Designer               Someone who specializes in graphic design

7. Network Administrator          A         person             who            manages        a
                                  communications network within an organization.
                                  Responsibilities           include         network security,
                                  installing new applications, distributing software
                                  upgrades, monitoring daily activity, enforcing
                                  licensing agreements, developing a storage
                                  management program                  and     providing    for
                                  routine backups.
8. PC Support                     People that helps u star up or fix your computer

9. Web Master                     person who designs or maintains a Web site
10. Database Administrator      A person responsible for the design and
                                management of one or more databases and for
                                the evaluation
11. Software Engineer           A person who designs and writes and tests
                                computer programs
12. Computer Crime              A criminal act committed through the use of a computer.
                                It can also involve the theft of a computer and any
                                equipment associated with the computer
13. Computer Fraud              Conduct that involves the manipulation of a computer or
                                computer data in order to obtain money, property, or
                                value dishonestly or to cause loss
14. Computer Hacking            Involves invading someone else’s computer, usually for
                                personal gain or just the satisfaction of invasion
15. Theft of Computer Time      An employee uses a company’s computer for personal
                                use such as running a small business, keeping records of
                                an outside organization, or keeping personal records
16. Data Diddling               Messing with others profile


17. Computer Virus              A virus is a program that has been written to cause
                                corruption of data on a computer
18. Worm                        Makes many copies of itself, resulting in the consumption
                                of system resources that slows down or actually halts
                                tasks.
19. Time Bomb                   Virus that does not cause its damage until a certain date
                                or until the system has been booted a certain number of
                                times.
20. Logic Bomb                  Virus triggered by the appearance or disappearance of
                                specified data
21. Trojan Horse                Virus that does something different from what it is
                                expected to do
22. Privacy & Security Issues   Any time you submit information on the Internet, it is
                                possible for the information to be gathered by many
                                persons and used for various situations including being
                                sold. Information can be gathered from online sources
                                such as schools, banks, hospitals, insurance companies,
                                and many other sources.
23. Security Measures           1. Passwords
                                2. Electronic Identification Cards
                                3. Firewalls
                                4. Antivirus Software
                                5. Selective Hiring Process

More Related Content

What's hot

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacythinkict
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Human Factor on Information Security -- Origin of Information Leakage
Human Factor on Information Security  -- Origin of Information LeakageHuman Factor on Information Security  -- Origin of Information Leakage
Human Factor on Information Security -- Origin of Information LeakageToru Nakata
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
20 tips for information security around human factors and human error
20 tips for information security around human factors and human error20 tips for information security around human factors and human error
20 tips for information security around human factors and human errorToru Nakata
 

What's hot (20)

2 01 Terms
2 01 Terms2 01 Terms
2 01 Terms
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacy
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
COmPuter
COmPuterCOmPuter
COmPuter
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Human Factor on Information Security -- Origin of Information Leakage
Human Factor on Information Security  -- Origin of Information LeakageHuman Factor on Information Security  -- Origin of Information Leakage
Human Factor on Information Security -- Origin of Information Leakage
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Data, data slides
Data, data  slidesData, data  slides
Data, data slides
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Data security
 Data security  Data security
Data security
 
20 tips for information security around human factors and human error
20 tips for information security around human factors and human error20 tips for information security around human factors and human error
20 tips for information security around human factors and human error
 

Viewers also liked (7)

vietnam kynning
vietnam kynningvietnam kynning
vietnam kynning
 
Trading Derivados 19/02/2014
Trading Derivados 19/02/2014Trading Derivados 19/02/2014
Trading Derivados 19/02/2014
 
Idea del Dia 19/02/2014
Idea del Dia 19/02/2014Idea del Dia 19/02/2014
Idea del Dia 19/02/2014
 
M.e.c.
M.e.c.M.e.c.
M.e.c.
 
Judge Dredd Case Files preview
Judge Dredd Case Files previewJudge Dredd Case Files preview
Judge Dredd Case Files preview
 
El gatt
El gattEl gatt
El gatt
 
Dates de vendanges 2014 en Champagne
Dates de vendanges 2014 en ChampagneDates de vendanges 2014 en Champagne
Dates de vendanges 2014 en Champagne
 

Similar to 2 01 Hw Finished

A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรSoftware Park Thailand
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environmentajitambekar
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
cyber securities in web development.pdf
cyber securities in web development.pdfcyber securities in web development.pdf
cyber securities in web development.pdfCuion Technologies
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 

Similar to 2 01 Hw Finished (20)

2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
2 0 Terms
2 0 Terms2 0 Terms
2 0 Terms
 
2 03 Hw
2 03 Hw2 03 Hw
2 03 Hw
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environment
 
Computer 4color
Computer 4colorComputer 4color
Computer 4color
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Technology
TechnologyTechnology
Technology
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
cyber securities in web development.pdf
cyber securities in web development.pdfcyber securities in web development.pdf
cyber securities in web development.pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 

2 01 Hw Finished

  • 1. BCT Section 2.01 Terms Technology Issues 1. Tech & Education 1. Education 2. Internet 3. Distance Learning 4. Computer-Based Learning 5. Simulations 2. Tech & Science 1. Artificial Intelligence 2. Genetic Engineering 3. Virtual Reality 3. Tech & Work 1. Multinational Economy 2. Electronic Commerce 4. Technology Careers 1. Business & Office 2. Administrative Assistant 3. Desktop Publisher/Graphic Designer 4. Network Support and Administration 5. PC Support Specialist 6. Manager of Information Systems 7. Database Administrator 8. Software Engineer 9. Web Master 5. Administrative Assistant a person employed to aid an executive, as in a corporate department, by coordinating such office services and procedures as the supervision, maintenance, and control of the flow of work and programs, personnel, budgeting, records, etc., for the entire department 6. Graphic Designer Someone who specializes in graphic design 7. Network Administrator A person who manages a communications network within an organization. Responsibilities include network security, installing new applications, distributing software upgrades, monitoring daily activity, enforcing licensing agreements, developing a storage management program and providing for routine backups. 8. PC Support People that helps u star up or fix your computer 9. Web Master person who designs or maintains a Web site
  • 2. 10. Database Administrator A person responsible for the design and management of one or more databases and for the evaluation 11. Software Engineer A person who designs and writes and tests computer programs 12. Computer Crime A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer 13. Computer Fraud Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss 14. Computer Hacking Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion 15. Theft of Computer Time An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records 16. Data Diddling Messing with others profile 17. Computer Virus A virus is a program that has been written to cause corruption of data on a computer 18. Worm Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. 19. Time Bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. 20. Logic Bomb Virus triggered by the appearance or disappearance of specified data 21. Trojan Horse Virus that does something different from what it is expected to do 22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources. 23. Security Measures 1. Passwords 2. Electronic Identification Cards 3. Firewalls 4. Antivirus Software 5. Selective Hiring Process